Recently Updated Pages
HAProxy + KAT
Sometimes IP address restrictions or IP-based allowlisting is not enough, think: airport lounge, ...
HAProxy
HAProxy is a fantastic reverse proxy with a massive amount of features. Knocknoc has supported HA...
Microsoft Azure NSG
Overview This integration allows for IP addresses to be dynamically managed within Azure Network...
Updates and upgrades
The Knocknoc software is managed by your operating system, as such updates can be managed within ...
Create users
User creation varies depending on the authentication source in use. Local users will need to be c...
Settings
The Settings in Knocknoc allows you to configure some of the basic setup like authentication sour...
Admins
Admins in Knocknoc can login to /admin on their Knocknoc server, however they can't be granted AC...
Create groups
Groups in Knocknoc map users to Knocs. Users can be assigned to multiple groups, to create a grou...
LDAP troubleshooting tips
The Knocknoc server will need to be able to contact your LDAP server on port 389 or 636. This is ...
Agent registration
API keys can be created to allow just-in-time orchestration Agent registration, which is suitable...
User authentication
User sessions can be created using the API. This is handy for machine to machine authentication, ...
Grant and revoke process
The granting and revoking of access by Knocknoc occurs on a number of events, including: User ...
SAML principles and terms
An overview of SAML principles and key terms to help you effectively configure and manage SAML wi...
Knocker - a cli utility for agents
The Knocker utility is a command-line tool for managing various backends with ease. It provides c...
Server installation (on premise)
On a Linux host as Root, execute the below command to setup and install your Knocknoc server. You...
SaaS deployment
To create a SaaS Server instance (we host it) log in to the licensing portal and follow the promp...
AWS infrastructure
Knocknoc ships with a script for updating security groups in AWS. Checkout the backend documentat...
Remote desktop, simple small business example
A small business sought a cost-effective, secure remote access solution for their remote desktop ...
Financial services data partner, secure web upload
Use case: Trusted partners secure access to web application A financial services provider relied...
High security subnets and JIT network access
Use case: Dynamic just-in-time IP restrictions for high-security subnet A critical infrastructur...